Book description
Emerging Trends in ICT Security, an edited volume, discusses the foundations and theoretical aspects of ICT security; covers trends, analytics, assessments and frameworks necessary for performance analysis and evaluation; and gives you the state-of-the-art knowledge needed for successful deployment of security solutions in many environments. Application scenarios provide you with an insider’s look at security solutions deployed in real-life scenarios, including but limited to smart devices, biometrics, social media, big data security, and crowd sourcing.
- Provides a multidisciplinary approach to security with coverage of communication systems, information mining, policy making, and management infrastructures
- Discusses deployment of numerous security solutions, including, cyber defense techniques and defense against malicious code and mobile attacks
- Addresses application of security solutions in real-life scenarios in several environments, such as social media, big data and crowd sourcing
Table of contents
- Cover image
- Title page
- Table of Contents
- Copyright
- Acknowledgments
- About the Editors
- List of Contributors
- Preface
-
Part 1: Information and Systems Security
-
Theory/Reviews of the Field
-
Chapter 1. System Security Engineering for Information Systems
- Information in this chapter
- Introduction
- System security engineering history
- Established system security engineering methods, processes, and tools
- Modern and emerging system security engineering methods, processes, and tools
- Conclusion
- Recommendations
- Disclaimer
- Acknowledgments
- References
- Further reading
- Chapter 2. Metrics and Indicators as Key Organizational Assets for ICT Security Assessment
- Chapter 3. A Fresh Look at Semantic Natural Language Information Assurance and Security: NL IAS from Watermarking and Downgrading to Discovering Unintended Inferences and Situational Conceptual Defaults
-
Chapter 1. System Security Engineering for Information Systems
-
Methods
- Chapter 4. An Approach to Facilitate Security Assurance for Information Sharing and Exchange in Big-Data Applications
- Chapter 5. Gamification of Information Security Awareness Training
- Chapter 6. A Conceptual Framework for Information Security Awareness, Assessment, and Training
- Chapter 7. Security Projects for Systems and Networking Professionals
- Case Study
-
Theory/Reviews of the Field
-
Part 2: Network and Infrastructure Security
- Theory Reviews of the Field
-
Methods
- Chapter 12. Advanced Security Network Metrics
- Chapter 13. Designing Trustworthy Software Systems Using the NFR Approach
- Chapter 14. Analyzing the Ergodic Secrecy Rates of Cooperative Amplify-and-Forward Relay Networks over Generalized Fading Channels
- Chapter 15. Algebraic Approaches to a Network-Type Private Information Retrieval
- Chapter 16. Using Event Reasoning for Trajectory Tracking
- Chapter 17. Resource-Efficient Multi-Source Authentication Utilizing Split-Join One-Way Key Chain
- Chapter 18. Real-time Network Intrusion Detection Using Hadoop-Based Bayesian Classifier
- Chapter 19. Optimum Countermeasure Portfolio Selection: A Knapsack Approach
- Chapter 20. CSRF and Big Data: Rethinking Cross-Site Request Forgery in Light of Big Data
- Chapter 21. Security through Emulation-Based Processor Diversification
- Chapter 22. On the Use of Unsupervised Techniques for Fraud Detection in VoIP Networks
- Part 3: Mobile and Cloud Computing
-
Part 4: Cyber Crime and Cyber Terrorism
-
Theory
-
Chapter 25. A Quick Perspective on the Current State in Cybersecurity
- Information in this chapter
- Introduction
- The scope of cybersecurity
- Contributions
- Understanding the scope of cybersecurity
- Malware, the infectious disease, and phishing, the fraud
- Vulnerabilities: The long exploitable holes
- Data breach: A faulty containment
- Cyber-war, the latest war front
- Lessons learned
- References
- Chapter 26. A Paradigm Shift in Cyberspace Security
-
Chapter 25. A Quick Perspective on the Current State in Cybersecurity
-
Methods
- Chapter 27. Counter Cyber Attacks By Semantic Networks
- Chapter 28. Man-in-the-Browser Attacks in Modern Web Browsers
- Chapter 29. Improving Security in Web Sessions: Special Management of Cookies
-
Chapter 30. Leveraging Semantic Web Technologies for Access Control
- Information in this chapter
- Introduction
- Implementing RBAC with ontologies
- Semantically extending the XACML attribute model
- Ontology-based context awareness
- Ontological specification of user preferences
- Semantic access control in online social networks
- DEMONS ontological access control model
- Discussion
- Acknowledgments
- References
- Chapter 31. Cyber Security Education: The Merits of Firewall Exercises
- Case Study
-
Theory
-
Part 5: Focus Topics: From Online Radicalisation to Online Financial Crime
- Theory
- Methods
- Index
Product information
- Title: Emerging Trends in ICT Security
- Author(s):
- Release date: November 2013
- Publisher(s): Morgan Kaufmann
- ISBN: 9780124104877
You might also like
book
Maximum Wireless Security
Maximum Wireless Security is a practical handbook that reveals the techniques and tools crackers use to …
audiobook
What's New in Software Architecture: Data Mesh and the AI Revolution with Zhamak Dehghani (Audio)
Join Neal Ford and Zhamak Dehghani for a discussion about the challenges of creating, sharing, and …
book
Gaming the Past
Despite the growing number of books designed to radically reconsider the educational value of video games …
book
Industry 4.0 Interoperability, Analytics, Security, and Case Studies
All over the world, vast research is in progress on the domain of Industry 4.0 and …